General

  • Target

    2024-05-23_4bba8c800900da5cada0713bd23a6557_cryptolocker

  • Size

    65KB

  • MD5

    4bba8c800900da5cada0713bd23a6557

  • SHA1

    7e726ed297da09b3fd65a9795e39169defbdbde1

  • SHA256

    cff92c39f9575fe29064cb40e402a907356d4b07cf309c390f16c4632fdd1383

  • SHA512

    3dcc075a280f0859f2cbb80717b6d67bb45af0c91d89b8885140ed1d3f5755903c331a90542f22210e9394b87b8c065aff5ce9bfde49cd442f558eb43ae77887

  • SSDEEP

    768:zQz7yVEhs9+syJP6ntOOtEvwDpjFelaB7yBEY9Su8F5mLZ5k52D:zj+soPSMOtEvwDpj4kpmeLmQq

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-23_4bba8c800900da5cada0713bd23a6557_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections